If you're not running any server services such as ssh or apache that are shared on the internet, you are probably ok without any extra protection. If you do run server services, there are plenty of free,

If you're not running any server services such as ssh or apache that are shared on the internet, you are probably ok without any extra protection. If you do run server services, there are plenty of free, open source programs to protect your system.

If you want to have it available on the internet, with a full web server and/or a ssh server, you should get fail2ban and set thresholds to block attacks. It may not matter too much if you have good passwords, but I install it because I don't like the constant attempts from remote sources. ( http://www.fail2ban.org/wiki/index.php/Main_Page )

If you run a fileserver for windows, you should install some kind of virus scanner such as clamAV ( http://www.clamav.net/lang/en/ ) to minimize the infections on the user workstations. It's better to catch some of the problems before they become problems to others.

Featured Post

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

​Being a Managed Services Provider (MSP) has presented you with challenges in the past— and by meeting those challenges you’ve reaped the rewards of success. In 2014, challenges and rewards remain; but as the Internet and business environment evol…

Learn how to navigate the file tree with the shell.
Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…